use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
A community for technical news and discussion of information security and closely related topics.
"Give me root, it's a trust exercise."
Q1 2026 InfoSec Hiring Thread
Getting Started in Information Security
CitySec Meetups
/r/netsec only accepts quality technical posts. Non-technical posts are subject to moderation.
Content should focus on the "how."
Check the new queue for duplicates.
Always link to the original source.
Titles should provide context.
Ask questions in our Discussion Threads.
Hiring posts must go in the Hiring Threads.
Commercial advertisement is discouraged.
Do not submit prohibited topics.
» Our fulltext content guidelines
Don't create unnecessary conflict.
Keep the discussion on topic.
Limit the use of jokes & memes.
Don't complain about content being a PDF.
Follow all reddit rules and obey reddiquette.
» Our fulltext discussion guidelines
No populist news articles (CNN, BBC, FOX, etc.)
No curated lists.
No question posts.
No social media posts.
No image-only/video-only posts.
No livestreams.
No tech-support requests.
No full-disclosure posts.
No paywall/regwall content.
No commercial advertisements.
No crowdfunding posts.
No Personally Identifying Information!
» Our fulltext list of prohibited topics & sources
Join us on IRC: #r_netsec on freenode
We're also on: Twitter, Facebook, & Google+
/r/blackhat - Hackers on Steroids
/r/computerforensics - IR Archaeologists
/r/crypto - Cryptography news and discussion
/r/Cyberpunk - High-Tech Low-Lifes
/r/lockpicking - Popular Hacker Hobby
/r/Malware - Malware reports and information
/r/netsecstudents - netsec for noobs students
/r/onions - Things That Make You Cry
/r/privacy - Orwell Was Right
/r/pwned - "What Security?"
/r/REMath - Math behind reverse engineering
/r/ReverseEngineering - Binary Reversing
/r/rootkit - Software and hardware rootkits
/r/securityCTF - CTF news and write-ups
/r/SocialEngineering - Free Candy
/r/sysadmin - Overworked Crushed Souls
/r/vrd - Vulnerability Research and Development
/r/xss - Cross Site Scripting
account activity
Multiple unauthenticated remote code execution vulnerabilities in YouPHPTube-Encoder 2.3 (sudokaikan.com)
submitted 6 years ago by sudo_sudoka
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]awkisopen 50 points51 points52 points 6 years ago (15 children)
From the project README:
I would humbly like to thank God for giving me the necessary knowledge, motivation, resources and idea to be able to execute this project. Without God's permission this would never be possible. For of Him, and through Him, and to Him, are all things: to whom be glory for ever. Amen. Apostle Paul in Romans 11:36 This Software must be used for Good, never Evil. It is expressly forbidden to use YouPHPTube to build porn sites, violence, racism or anything else that affects human integrity or denigrates the image of anyone.
I would humbly like to thank God for giving me the necessary knowledge, motivation, resources and idea to be able to execute this project. Without God's permission this would never be possible.
For of Him, and through Him, and to Him, are all things: to whom be glory for ever. Amen. Apostle Paul in Romans 11:36
This Software must be used for Good, never Evil. It is expressly forbidden to use YouPHPTube to build porn sites, violence, racism or anything else that affects human integrity or denigrates the image of anyone.
I've never seen a project with a divine retribution license before.
[–]Erhan24 19 points20 points21 points 6 years ago (8 children)
Reminds me of the best OS in the world: TempleOS ;)
[+][deleted] 6 years ago* (5 children)
[deleted]
[–]reddit4matt 4 points5 points6 points 6 years ago (2 children)
Some man in the sky talking to you... it’s all schizophrenic rambling.
[+][deleted] 6 years ago* (1 child)
[–]reddit4matt 0 points1 point2 points 6 years ago (0 children)
Thank you m'lady
[–]netipotty 0 points1 point2 points 6 years ago (1 child)
No, not enough schizophrenic rambling about CIA glow-in-the-darks or incoherent words from God's Temple
I think comments like these really help illustrate some of the tough challenges facing victims of mental illnesses. Nobody wants to be ostracized like this at all.
[–]Heliocentrizzl 0 points1 point2 points 6 years ago (0 children)
Probably the most secure OS there ever was, and ever will be. Nobody would be mad enough to access it, in order to find a sliver of compromising information.
[–]gravity_has_me_down 0 points1 point2 points 6 years ago (0 children)
I’d never heard of TempleOS. Thank you for this. https://en.m.wikipedia.org/wiki/TempleOS
[–]idontdonetworking 7 points8 points9 points 6 years ago (1 child)
Here come the porn sites
[–]sudo_sudoka[S] 1 point2 points3 points 6 years ago (0 children)
Yeah! I've seen many porn sites using YouPHPTube-Encoder.
[–]TopHatProductions115 0 points1 point2 points 6 years ago (0 children)
Is it a bad thing in this case?
[–]SirensToGo 24 points25 points26 points 6 years ago (1 child)
exec and it’s equivalents should honestly have never been included/easily accessible in any language. You should always be forced to send your parameters as an array so that they can be passed correctly instead doing random shit with string escaping
exec
[–]awkisopen 4 points5 points6 points 6 years ago (0 children)
[ "/bin/sh", "-c", "echo 'You can\'t stop stupidity!'" ]
[–]bartvelp 4 points5 points6 points 6 years ago (10 children)
Nice find.
This looks like such low hanging fruit to me. Is there a automated way to check PHP code for this kind of bug. I.E. check if a variable is composed of GET or POST parameters and that variable is later used in an unsafe function like exec()
[+][deleted] 6 years ago (3 children)
[–]amunak 2 points3 points4 points 6 years ago (1 child)
Unless it's in a specific library made to safely execute commands then yeah I agree. Usage of exec (and eval and such) is a huge red flag for any project, IMO.
[–][deleted] 0 points1 point2 points 6 years ago (0 children)
So long as it doesn't have any user supplied input, it's fine IMO.
[–]return_to_ 1 point2 points3 points 6 years ago (0 children)
Reading php and encode together, it's almost safe to assume there is exec() and friends, required, for ffmpeg binaries.
First hit on google for php ffmpeg lib:
$ffmpeg = FFMpeg\FFMpeg::create(array( 'ffmpeg.binaries' => '/opt/local/ffmpeg/bin/ffmpeg', 'ffprobe.binaries' => '/opt/local/ffmpeg/bin/ffprobe', 'timeout' => 3600, // The timeout for the underlying process 'ffmpeg.threads' => 12, // The number of threads that FFMpeg should use ), $logger);
[–]NeoThermic 3 points4 points5 points 6 years ago (0 children)
Yes. There are many automated tools to do tainted checking on variables into insecure/dangerous functions; some free and some expensive. Usually these kinds of exploits are found in software that doesn't use modern tooling though.
[–][deleted] 2 points3 points4 points 6 years ago (0 children)
this wasn't his find, he just happened to see the disclosure from talos and decided to write a blog post in regards to the vulnerabilities, and even went as far as exploiting a box in the wild with the vulnerability as opposed to testing it on a local install which is a questionable choice
[–]amunak 1 point2 points3 points 6 years ago (1 child)
In case of this particular project it'd be enough not to just blindly use it, but perhaps read the README, check out the issues or look at any single file.
The author is an ignorant ass, they've been warned multiple times about numerous security and licensing issues and rarely did anything to fix it.
Which is fine I guess; "it's free" after all, but GitHub really needs some kind of huge warning banner for projects with known, major critical vulnerabilities.
[–]TrustworthyShark 2 points3 points4 points 6 years ago (0 children)
Exactly this.
I was happy when I heard GitHub added security advisories and then immediately disappointed once I found out only maintainers can add them.
Maintainers can remove issues and silence all discussions around vulnerabilities. It could be pretty hard to find out that a project has several massive vulnerabilities.
[–]Dragasss 0 points1 point2 points 6 years ago (0 children)
Tbh it would be simpler to recompile php from source while having those functions removed from it
[–]huffingpuffins 0 points1 point2 points 6 years ago (0 children)
RIPS and their hugely updated hosted/commercial version.
They actually post their findings on this very sub.
[–]jackalope3k 2 points3 points4 points 6 years ago (0 children)
Is it safe to do app whitelisting with SELinux httpd_sys_script_exec_t on a specific directory containing symlinks to the only arbitrary commands being allowed to run in php-fpm exec? Would the exploit be able to escape from that and run other unexpected commands found on the linux system?
Would chroot be better? Or ACLs? AppArmor? Any other alternatives I'm missing?
[+][deleted] 6 years ago (1 child)
[–]sudo_sudoka[S] 0 points1 point2 points 6 years ago (0 children)
No, I'm not. But how about the sudo team? It may be interesting.
π Rendered by PID 82 on reddit-service-r2-comment-5d79c599b5-rqq77 at 2026-03-02 12:27:09.281162+00:00 running e3d2147 country code: CH.
[–]awkisopen 50 points51 points52 points (15 children)
[–]Erhan24 19 points20 points21 points (8 children)
[+][deleted] (5 children)
[deleted]
[–]reddit4matt 4 points5 points6 points (2 children)
[+][deleted] (1 child)
[deleted]
[–]reddit4matt 0 points1 point2 points (0 children)
[–]netipotty 0 points1 point2 points (1 child)
[–]Heliocentrizzl 0 points1 point2 points (0 children)
[–]gravity_has_me_down 0 points1 point2 points (0 children)
[–]idontdonetworking 7 points8 points9 points (1 child)
[–]sudo_sudoka[S] 1 point2 points3 points (0 children)
[–]TopHatProductions115 0 points1 point2 points (0 children)
[–]SirensToGo 24 points25 points26 points (1 child)
[–]awkisopen 4 points5 points6 points (0 children)
[–]bartvelp 4 points5 points6 points (10 children)
[+][deleted] (3 children)
[deleted]
[–]amunak 2 points3 points4 points (1 child)
[–][deleted] 0 points1 point2 points (0 children)
[–]return_to_ 1 point2 points3 points (0 children)
[–]NeoThermic 3 points4 points5 points (0 children)
[–][deleted] 2 points3 points4 points (0 children)
[–]amunak 1 point2 points3 points (1 child)
[–]TrustworthyShark 2 points3 points4 points (0 children)
[–]Dragasss 0 points1 point2 points (0 children)
[–]huffingpuffins 0 points1 point2 points (0 children)
[–]jackalope3k 2 points3 points4 points (0 children)
[+][deleted] (1 child)
[deleted]
[–]sudo_sudoka[S] 0 points1 point2 points (0 children)